Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-05-2024 01:17
Static task
static1
Behavioral task
behavioral1
Sample
77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe
-
Size
332KB
-
MD5
77709ccfdd8b04d98eee33db53d68e51
-
SHA1
c72f56c1330704aae591ca7e029399a6aaf6036f
-
SHA256
a7c1f86f505e55bec1323327c159ff3ecbdc37b847f26aed4ee28b9fecba5742
-
SHA512
b1e6fd8a6a568eadbb9f53de3785f44ac0b559dfa6be6b1b3ae3b14db70f35f2c69742ae0647a3010779238ea48d1bdd78cc953deab229f760c5c27348ebc949
-
SSDEEP
3072:UubHlt9Q/K0+Z3DEsmaey0WmPDL4VhBjnMvHlGDu2e9cMFGYhzFfqZVuoKMuu:DH7E4eF23IvHlouxcAG42uZ3
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exedescription pid process target process PID 3000 set thread context of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1944 2212 WerFault.exe svchost.exe -
NTFS ADS 1 IoCs
Processes:
cmd.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe:Zone.Identifier cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exesvchost.exedescription pid process target process PID 3000 wrote to memory of 2756 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe cmd.exe PID 3000 wrote to memory of 2756 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe cmd.exe PID 3000 wrote to memory of 2756 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe cmd.exe PID 3000 wrote to memory of 2756 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe cmd.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 3000 wrote to memory of 2212 3000 77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe svchost.exe PID 2212 wrote to memory of 1944 2212 svchost.exe WerFault.exe PID 2212 wrote to memory of 1944 2212 svchost.exe WerFault.exe PID 2212 wrote to memory of 1944 2212 svchost.exe WerFault.exe PID 2212 wrote to memory of 1944 2212 svchost.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C type nul > "C:\Users\Admin\AppData\Local\Temp\77709ccfdd8b04d98eee33db53d68e51_JaffaCakes118.exe:Zone.Identifier"2⤵
- NTFS ADS
PID:2756 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 1643⤵
- Program crash
PID:1944